IDG News Service - Dirty political tricks are going Web 2.0 in the 2008 presidential election, with scammers using Facebook, text messaging and e-mail hacking to try to trick people into missing their chance to vote.
Scammers have long used fake fliers or automated calling banks to target groups of voters in hopes of either scaring them away from polling stations or tricking them into showing up on the wrong day.
But this year, these dirty tricks have expanded. In a conference call with media on Tuesday, Jon Greenbaum, a spokesman for the Lawyers' Committee for Civil Rights Under Law, said that these tactics are on the rise in 2008. "We're surprised at how ubiquitous it's become and how sophisticated it's become," he said.
His group had seen robocalls and fliers with this type of message in 12 states so far in this election, including Florida, Louisiana and Virginia. That's about twice as many states as during the 2004 presidential election.
On Facebook, for example, there have been at least three instances of fraudulent voting messages posted over the past two days, according to Facebook Inc. spokesman Barry Schnitt. In each case, messages were posted saying that Republicans were set to vote on Tuesday, while Democrats would vote on Wednesday.
One of these messages was posted on the Facebook group page for Missouri State University, Greenbaum said.
The messages were quickly removed after being flagged by users and have been seen by only a small number of people on the site, Schnitt said. "Facebook is not a very effective way to do this," he said, adding that the company plans to refer the messages to law enforcement.
Youth voting group Rock the Vote says voters in Florida, Arizona, Colorado, Utah and Pennsylvania have received similar text messages on their mobile phones, reading: "Due to long lines tomorrow, all Obama voters are asked to vote Wednesday. Thank you."
E-mail hacking has come into play, too.
About 35,000 students at George Mason University were sent a fake e-mail early Tuesday, also telling them to vote on Wednesday. The message appeared to be from the school's provost, Peter Stearns. According to The Washington Post, a hacker managed to route this message to the university via servers at Wiredforchange.com, a Democratic fund-raising company in Washington.
"To the Mason community," the fake e-mail reads. "Please note that election day has been moved to November 5th. We apologize for any inconvenience this may cause you."
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts